• Zine
  • Anonymous
  • Green
  • IT
  • Gadgets
  • Tech
  • Cloud
  • Data
  • Network
  • Security
  • Hosting
    • Sunset Host Co
    • Radio Host Co
  • Media
    • WSCA News
    • Sunset Crypto
    • Sustainable Action Now
    • Life.Style Magazine
    • Sunset Daily
    • Sunset Music News
    • Pro Merch Sports News
    • Explore New Jersey
    • Explore NJ News
    • The Zine Weekly
Facebook Twitter Instagram
Tuesday, May 17
Facebook Twitter Instagram
The Zine Weekly
  • Zine

    Announcing Reliable Dedicated Server Hosting Provider with Australia, Sydney, Melbourne based IP – TheServerHost – IT Industry Today

    May 17, 2022

    Google is remaking search, maps for the TikTok generation

    May 17, 2022

    Femcels: The ‘involuntarily celibate’ women who say they are barred from sex and romance | Society

    May 17, 2022

    Indian Tablet Market Grew 68 Percent in Q1 2022 With Lenovo on Top: Cybermedia Research

    May 17, 2022

    My Favorite Things on the Internet

    May 17, 2022
  • Anonymous

    Femcels: The ‘involuntarily celibate’ women who say they are barred from sex and romance | Society

    May 17, 2022

    Eurovision 2022: Russian hackers targeted contest, say Italian police

    May 16, 2022

    How Netflix Is a Joke Addresses a Film Distribution Flaw

    May 14, 2022

    How to Fight Foreign Hackers With Civil Litigation

    May 14, 2022

    Former hacktivist provides security advice

    May 13, 2022
  • Green

    Scientists create renewable biocement made entirely from waste materials

    May 16, 2022

    Proposed improvements to SiC MOSFET power converter technology overcome existing challenges

    May 14, 2022

    Emerging hydrogen storage technology could increase energy resilience

    May 11, 2022

    Microgrid demo to lend a helping hand in India’s green energy transition

    May 9, 2022

    California prepares for energy shortfalls in hot, dry summer

    May 7, 2022
  • IT

    Indian Tablet Market Grew 68 Percent in Q1 2022 With Lenovo on Top: Cybermedia Research

    May 17, 2022

    How to download YouTube videos

    May 16, 2022

    Roe v. Wade reversal could hinder data privacy rights

    May 16, 2022

    Bumper blast! Apple’s smartphone is available for less than 50,000.

    May 15, 2022

    Aura Review | PCMag

    May 14, 2022
  • Gadgets

    Google is remaking search, maps for the TikTok generation

    May 17, 2022

    Apex Legends Mobile Review: The Resemblance Is Uncanny

    May 16, 2022

    Our study suggests they boost intelligence in children

    May 16, 2022

    Realme TechLife Watch SZ100 India Launch Date Set for May 18, Teased to Offer Up to 12-Day Battery Life

    May 15, 2022

    These high-tech must-have products have actually gotten cheaper

    May 14, 2022
  • Tech

    My Favorite Things on the Internet

    May 17, 2022

    Two Twitter bosses ousted ahead of Elon Musk $44bn takeover

    May 13, 2022

    4D composite printing could improve the wings of drones

    May 11, 2022

    How to delete unused styles using VBA in Word

    May 9, 2022

    Best Gas Credit Cards in May 2022

    May 6, 2022
  • Cloud

    Innovatrics, Blaize partner on AI ready-to-deploy facial recognition technology

    May 17, 2022

    To Drive Technological Progress, We Need Worker Power

    May 16, 2022

    The age of discontinuity | The Manila Times

    May 15, 2022

    Alibaba Cloud-UCSI to support digital economy

    May 15, 2022

    The Matter of Everything, Twelve Experiments that Changed our World: Rich rewards

    May 14, 2022
  • Data

    Real-time Analytics News for Week Ending May 14

    May 16, 2022

    Greatest REIT Wannabes Of All-Time: Part I

    May 15, 2022

    Metaverse: ‘Train your robots in the virtual world’ (CXOTalk interview)

    May 15, 2022

    Evoque Partners with Archer Datacenters to Develop 61 Acre

    May 14, 2022

    A Recipe to Migrate and Scale Monoliths in the Cloud

    May 13, 2022
  • Network

    Ansible vs Puppet | Compare DevOps Tools

    May 17, 2022

    Why Build in Web3

    May 16, 2022

    Broadband Nutrition Labels and Deployment See Renewed Focus in Washington

    May 15, 2022

    BHO Network announces its partnership with ConsenSys

    May 15, 2022

    Twitter’s Parag Agrawal after firing top execs: ‘Expect more change for the better’

    May 14, 2022
  • Security

    Venezuelan doctor accused of selling computer programs to steal data in the US

    May 17, 2022

    Food Truck Festival Giveaway Rules

    May 16, 2022

    Tricity grapples with a new epidemic: Cyber crime

    May 15, 2022

    The foreign diplomatic contingent – Kaieteur News

    May 15, 2022

    What happened when I tried virtual coworking.

    May 14, 2022
  • Hosting
    1. Sunset Host Co
    2. Radio Host Co
    Featured

    Announcing Reliable Dedicated Server Hosting Provider with Australia, Sydney, Melbourne based IP – TheServerHost – IT Industry Today

    By Sunset Host CoMay 17, 20220
    Recent

    Announcing Reliable Dedicated Server Hosting Provider with Australia, Sydney, Melbourne based IP – TheServerHost – IT Industry Today

    May 17, 2022

    Announcing Reliable Dedicated Server Hosting Provider with USA, US, New York, California, Texas based IP – TheServerHost – IT Industry Today

    May 16, 2022

    Elon Musk Takes a Stand in Controversial Disney Copyright Case

    May 15, 2022
  • Media
    1. WSCA News
    2. Sunset Crypto
    3. Sustainable Action Now
    4. Life.Style Magazine
    5. Sunset Daily
    6. Sunset Music News
    7. Pro Merch Sports News
    8. Explore New Jersey
    9. Explore NJ News
    10. The Zine Weekly
    Featured
    Recent

    Announcing Reliable Dedicated Server Hosting Provider with Australia, Sydney, Melbourne based IP – TheServerHost – IT Industry Today

    May 17, 2022

    Google is remaking search, maps for the TikTok generation

    May 17, 2022

    Femcels: The ‘involuntarily celibate’ women who say they are barred from sex and romance | Society

    May 17, 2022
The Zine Weekly
You are at:Home » IT Act reforms: Plug leakage of sensitive State information
Hosting solutions

IT Act reforms: Plug leakage of sensitive State information

Sunset Host CoBy Sunset Host CoMarch 27, 2022No Comments4 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email

At a recent Nasscom event, Union minister of state for electronics and information technology Rajeev Chandrasekhar said India needs a new digital law as the current one — the Information Technology Act, 2000 — is more than 20 years old. The minister is passionate about making the IT system user-friendly and technologically near-perfect. But the fundamental question is whether the Act needs to be tweaked at all or not. No legislation is perfect. As a government implements a law, infirmities surface.

In 2008, the IT Act underwent an overhaul. Several reforms were made, including the substitution of “digital signature” with “electronic signature” to make the Act technology-neutral. Also, the expression “communication device” was defined to include mobiles and any other device used for sending or transmitting text, video, audio or an image. Further effort was made to define an “intermediary” to protect the innocent and the unwitting transmission of objectionable material by a service provider or other persons. Perhaps the most essential addition to the law was Section 66A to 66F, which took cognisance of offences, including the circulation of obscene material and the commission of identity theft. The first time cognisance of violation of privacy was another distinctive feature of the 2008 Act.

Significantly, Section 69 was amended to give enough power to the State to direct interception and monitoring of encrypted messages. Sections 69A and 69 B specifically empowered the government to block information passing through a computer resource. The section was meant to combat terrorism.

No discussion of the IT Act, as promulgated in 2000 and heavily amended in 2008, will be complete without referencing how the term “intermediaries” was defined and expanded. While the former gave protection to network service providers, the 2008 enactment expanded the circumstances under which such protection will be available to a wide range of individuals and organisations, including telecom service providers, network service providers, internet service providers and web-hosting service providers.

This protection, however, is not available as a matter of routine. It is necessary that the person claiming it did not himself originate the impugned information and should prove to the authorities that he employed due diligence to make sure that no offensive communication passed through him, or his device.

Since then, a few other minor amendments have been made. These have taken care of the emerging scenario where computers have revolutionised the scene. However, it is true that almost every other month, a novel form of cybercrime is reported. The IT Act cannot provide for this bizarre situation except to put down a broad rubric for various offences. Hence, tinkering with the Act every time a new form of crime comes to the surface may be inexpedient or not called for.

The focus of reforms should be on preventing leakage of sensitive information about the State or what should remain within the preserve of a computer user. Both the technology deployed and the greatest circumspection of every user can frustrate a wilful intruder. However, if the user himself or herself is complicit, as was in the case of the recent National Stock Exchange scandal, where a few favoured individuals were allegedly allowed access to a server before other legitimate users, no technology or law can help.

Security and privacy have become hollow mantras employed when they suit government or computer users. Sometimes it is amusing to watch the paranoia that dictates them. I am inclined to go with Bruce Schneier, the famous cryptographer and cybersecurity expert, who said, “Secrecy and security aren’t the same, even though it may seem that way. Only bad security relies on secrecy; good security works even if all the details of it are public”.

Let us bring some sobriety and balance to the issue of security and safety. Only then will we know how to live fearlessly and sensibly.

RK Raghavan is a former CBI director. He is currently professor, Jindal Global University, Sonepat, Haryana

The views expressed are personal

Share this:

  • Twitter
  • Facebook

Related

india IT rajeev chandrashekhar service provider Technology union minister
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleiQoo U5x With Qualcomm Snapdragon 680 SoC, Dual Rear Cameras Launched: Price, Specifications
Next Article The Biggest Streaming Mergers and Acquisitions from Last Year
Sunset Host Co
  • Website
  • Facebook
  • Twitter
  • Pinterest
  • Instagram
  • Tumblr
  • LinkedIn

Related Posts

Announcing Reliable Dedicated Server Hosting Provider with Australia, Sydney, Melbourne based IP – TheServerHost – IT Industry Today

May 17, 2022

Announcing Reliable Dedicated Server Hosting Provider with USA, US, New York, California, Texas based IP – TheServerHost – IT Industry Today

May 16, 2022

Elon Musk Takes a Stand in Controversial Disney Copyright Case

May 15, 2022

Leave A Reply Cancel Reply

Categories
  • Anonymous (97)
  • Cloud (152)
  • Data Center (134)
  • Gadgets (175)
  • Green Tech (39)
  • Hosting solutions (97)
  • IT News (98)
  • Network (143)
  • Security (136)
  • Tech (97)
  • Web hosting (58)
  • Zine
  • Anonymous
  • Green
  • IT
  • Gadgets
  • Tech
  • Cloud
  • Data
  • Network
  • Security
  • Hosting
    • Sunset Host Co
    • Radio Host Co
  • Media
    • WSCA News
    • Sunset Crypto
    • Sustainable Action Now
    • Life.Style Magazine
    • Sunset Daily
    • Sunset Music News
    • Pro Merch Sports News
    • Explore New Jersey
    • Explore NJ News
    • The Zine Weekly

Subscribe to Updates

Get the latest tech news from the Zine at the Sunset Host Co. and the Radio Host Co.

Announcing Reliable Dedicated Server Hosting Provider with Australia, Sydney, Melbourne based IP – TheServerHost – IT Industry Today

May 17, 2022

Google is remaking search, maps for the TikTok generation

May 17, 2022

Femcels: The ‘involuntarily celibate’ women who say they are barred from sex and romance | Society

May 17, 2022

Indian Tablet Market Grew 68 Percent in Q1 2022 With Lenovo on Top: Cybermedia Research

May 17, 2022

My Favorite Things on the Internet

May 17, 2022

Venezuelan doctor accused of selling computer programs to steal data in the US

May 17, 2022

Ansible vs Puppet | Compare DevOps Tools

May 17, 2022

Innovatrics, Blaize partner on AI ready-to-deploy facial recognition technology

May 17, 2022
Copyright © 2022. The Zine Weekly, an SCA Entertainment & Media Company. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.